hHB: AHarder HB+ Protocol

被引:0
|
作者
Ka, Ahmad Khoureich [1 ]
机构
[1] Alioune Diop Univ Bambey, Dept Comp Sci, Bambey, Senegal
来源
2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4 | 2015年
关键词
RFID; Authentication; LPN; HB+; Man-In-the-Middle; SECURITY;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-constrained devices such as RFID tags. The HB+ protocol is based on the Learning Parity with Noise (LPN) problem and is proven secure against active adversaries. Since a man-in-the-middle attack on HB+ due to Gilbert et al. was published, many proposals have been made to improve the HB+ protocol. But none of these was formally proven secure against general man-in-the-middle adversaries. In this paper we present a solution to make the HB+ protocol resistant to general man-in-the-middle adversaries without exceeding the computational and storage capabilities of the RFID tag.
引用
收藏
页码:163 / 169
页数:7
相关论文
共 42 条
  • [1] Parallel and concurrent security of the HB and HB+ protocols
    Katz, Jonathan
    Shin, Ji Sun
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 73 - 87
  • [2] HB#:: Increasing the security and efficiency of HB+
    Gilbert, Henri
    Robshaw, Matthew J. B.
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 361 - 378
  • [3] Active attack against HB+:: a provably secure lightweight authentication protocol
    Gilbert, H
    Robshaw, M
    Sibert, H
    ELECTRONICS LETTERS, 2005, 41 (21) : 1169 - 1170
  • [4] Parallel and Concurrent Security of the HB and HB+ Protocols
    Katz, Jonathan
    Shin, Ji Sun
    Smith, Adam
    JOURNAL OF CRYPTOLOGY, 2010, 23 (03) : 402 - 421
  • [5] Parallel and Concurrent Security of the HB and HB+ Protocols
    Jonathan Katz
    Ji Sun Shin
    Adam Smith
    Journal of Cryptology, 2010, 23 : 402 - 421
  • [6] A Novel Probabilistic Passive Attack on the Protocols HB and HB+
    Carrijo, Jose
    Tonicelli, Rafael
    Imai, Hideki
    Nascimento, Anderson C. A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (02): : 658 - 662
  • [7] Good variants of HB+ are hard to find
    Gilbert, Henri
    Robshaw, Matthew J. B.
    Seurin, Yannick
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 156 - 170
  • [8] A Fault Analytic Method against HB+
    Carrijo, Jose
    Tonicelli, Rafael
    Nascimento, Anderson C. A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 855 - 859
  • [9] Session-HB: Improving the Security of HB+ with a Session Key Exchange
    Ka, Ahmad Khoureich
    INNOVATION AND INTERDISCIPLINARY SOLUTIONS FOR UNDERSERVED AREAS, 2018, 204 : 202 - 212
  • [10] An Improved HB+ Protocol and its Application to EPC Global Class-1 Gen-2 Tags
    Shi, Zhicai
    Dai, Jian
    Wu, Fei
    Xia, Yongxiang
    Wang, Yihan
    Wang, Changzhi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 211 - 220